[Doh] Is privacy a DoH protocol goal? (was: some privacy ponderings wrt HTTPs and plain DNS)

nusenu <nusenu-lists@riseup.net> Tue, 19 June 2018 12:31 UTC

Return-Path: <nusenu-lists@riseup.net>
X-Original-To: doh@ietfa.amsl.com
Delivered-To: doh@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 847F9130EEB for <doh@ietfa.amsl.com>; Tue, 19 Jun 2018 05:31:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.72
X-Spam-Level:
X-Spam-Status: No, score=-2.72 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=riseup.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TfxRtZzKUL8c for <doh@ietfa.amsl.com>; Tue, 19 Jun 2018 05:31:18 -0700 (PDT)
Received: from mx1.riseup.net (mx1.riseup.net [198.252.153.129]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7BAEF130EEC for <doh@ietf.org>; Tue, 19 Jun 2018 05:31:17 -0700 (PDT)
Received: from cotinga.riseup.net (cotinga-pn.riseup.net [10.0.1.164]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client CN "*.riseup.net", Issuer "COMODO RSA Domain Validation Secure Server CA" (verified OK)) by mx1.riseup.net (Postfix) with ESMTPS id 106AD1A0E60 for <doh@ietf.org>; Tue, 19 Jun 2018 05:31:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=riseup.net; s=squak; t=1529411477; bh=OvUuctYs3fBZg8q84PxgqTdWJAqu1OKZItxzhLzJUpY=; h=To:From:Subject:Date:From; b=rNqyU7q3/um32YuGruR6jJ/ynkk6Ys2CfbeRUn6DUdNL72wBPnkng7SdXbo9zBcg9 jEs+3E6I3L+tAkRcGLvPfNMqBfGs5yV7xNkTJyfLC3qKGyMKxWqGL2Cnwk03T7+jYe pFNbLI7n3wwwY9tjiybKRxJu9hMVSWcM10GGPl6U=
X-Riseup-User-ID: E0755984383EF6340187A50AED30BAD3BDCB49786AEA4D6B11DCE28253781DD0
Received: from [127.0.0.1] (localhost [127.0.0.1]) by cotinga.riseup.net with ESMTPSA id EDE3DC72C6 for <doh@ietf.org>; Tue, 19 Jun 2018 05:31:15 -0700 (PDT)
To: doh@ietf.org
From: nusenu <nusenu-lists@riseup.net>
Openpgp: preference=signencrypt
Autocrypt: addr=nusenu-lists@riseup.net; prefer-encrypt=mutual; keydata= xsFNBFj53gUBEADYKwT0pW1yiqt6UReZW8T2nXVCyeVT2G6z7AvW69afp82uthRH237pQ7Qs 5vq91DivN6fGN6cVksp0N9Yv+5HEQAwUxpLfcNDcGzmHMd0JMItEtozGv3a4FuiUoHAqeGXM 6Kzi3v5F2PZGF+U4QaGKEZq6u50gO/ZFy4GfC9z9tsO6Cm7s7KldVHMGx/a0MEGMwh6ZI9x2 hGXSSAKu58KRUkEpHzDiQTj+/j58ndNfZRQv6P5BLppHADRPqwEOm4RQcQYskyM0FdKXbJ8E 5GW268meflfv2BASsl3X/Xqxp+LNrstXIbFZ+38hVlQDDmdvaASpPTzIAxf8FxMYZqI+K1UE kP5nU45q84KiZoXwT6YYJDKToLSDnYkKlsrCSnLkE3Nb/IexgNoYO4nE6lT9BDV3athQCWw1 FwB5idRYWnIqbVgUFgYZDUdZBJmeTEeI+Wn5hFz6HvFVc/+haMVTcoEKSkG/tsSGsKOc2mp6 z+71io9JWrVQGmw7OeZeE4TvkF9GhwS8jrKO4E0crfcT/zT6368PZCO6Wpir8+po/ZfOWbbh 1hi3MxmXn4Fki55Zrvhy3sf28U+H/nByQV4CssYv/xVhIZsN/wNQLcDLgVs4JTBUik8eQR0Y Qrq9lG3ZVtbpEi7ZTJ6BOGIn2TKHsVIVGSQA0PdKpKYV45Lc4QARAQABzSBudXNlbnUgPG51 c2VudS1saXN0c0ByaXNldXAubmV0PsLBfQQTAQgAJwUCWPneBQIbAwUJBaOagAULCQgHAgYV CAkKCwIEFgIDAQIeAQIXgAAKCRCtYTjCRc1Cfq/kD/sHx+mnL6OLwJvBj1rVTyoHJYJARajz Go0yRlbrZSH6Z05OD3SDR9UVpWOZeY8JyFoTyCFQjAbIVjKifj0uSmi0j1iahrAgGGfik0cN XUkCxrW6jcJQ37EbvYWu4PryqLuC7IeQW1wCcB1ioyGYKkm2K6LZ9rzZPVYSmPohJ+gVI0Jt EdlNZl4JuZot9eA5w/22uvcStQHzXDsUxfqK8OAJpU8E3iBBdNpLPMDWpFz4g2yw5PD6jZ+K Q39PYMUFULaKe4YCw1O+0MFhZJI4KEcRYHuVy1b3cJjxzgVfEyFctLDsO1sh07vBhoVKUi8W e00pvGtv8QYxxMYIA3iACbsjGEr69GvvZ2pAnu9vT9OUCaES4riDCxbkMxK/Cbwk8F6mo0eq HDQ7sOZWQv81ncdG9ovlA7Pj96cEXgdtbbllF1aUZ8sAmT14YjGzhArGv7kyJ1imH5tX3OXk hBGA9JTk2mDNjEpFaTEajSvDiKyeEhWNTLm15siWkpg1124yjUkhQ3OCkw7aUDMiVn8+DQHo J2pP/84uUvngbhm1jV7nk8mxTUFgppUePkb5hhnRRzeK72QY00EwRdn7qnpNgijMJ3Fpjfy2 EeCEl3nNdcB7U0F+0ijA6P/+DROldxNr4eiP50RvV8XiW/yi2IkKBk50GNB87yYnDETxxx/c 2i00AM7BTQRY+d4FARAAwJZ6U7UT8uB1WCfLK3AOR1Wa9bzOAghlTR4WXbHB4ajQKG7/Fzud 99bnwD0V3/AOVz/SbGDyHe+7HMvd1A0Ll4NgyH6OpxY7wOwCXAYTAbcXLpM7eKTjjsb9A9XG 3FcIGvjcy76OkaewqhiABaShlStEYcPkRusHZuecXtCnfCjJKihU/kinWpBO9gY6SrF2KFCw aeS4r37brXQ9y8uy3gZ168QFuIa5AKfL0r5YN3k4StNSA2p5Z/pufWXMN3B03QC+3fireiz3 dinlHK6XjUW8oWSdNxJhexT/lUw+episNuWTQruy7PD+HeohYGXqjggmPUiWc171Sewb2f8H CHViHMee8QXqo/LSRkYVrtsx0HUSMKsVQOma/u2By03ucroIkQJQQfqX3YpK1i3EpUO2L0/m E8UpBvUm1vrst54EFym4tYNJTj9reVffFKh2cczmPVN5o8v3RrdTF96mGtcb9EJbGV4277ZE LqUspviEBXynqU3yZ48JhIWHj22/ha6TeBpapYZDOJ8lePed8E34J/GYE2YXl65LhpXAKvWz O3KiByGMysb9Li6zqZ9/BYQtg5CA6Q8Oo7pBxK4iiDH3GX2WvymmLoaOBpOaIYdvKr39fajE mzfbg7TdZKXxqp2KDrbw7vUJLDyrmPWpxHyhKHItzoi1Y59wzYSq3h0AEQEAAcLBZQQYAQgA DwUCWPneBQIbDAUJBaOagAAKCRCtYTjCRc1CfpfgEAC3tXZzhgKbF6fx5gMNDp/9MBpialvu k69UaGL3HUqM0/ytiT4FjYUmOK2mk37iop46GivsOC50PykG9gjbg9/QKUqgsZzJ8LJ+ldY4 /GKtiP5JoO59Obj8MJJ5Ta8yPfZiiNx/I8ydqd18E4PmQUCPlEKhett81t3+8R/mGwG72TaA hHwDjZAEjiXdnXh+z0AKpflCnYQafq0V73ofzuw4KovpJWMk/WPs5oSHhuV4TZ8nRkF6BR4y rEvs1kq8Y6DuNqQGwY3yilpnmqfMzzlWo7MlY657domU54bhGOsvNuZZsFDlcBczQo6h9OKq ckkVHUMAw38pX+EghzEfhYVWYmLNv5G9TA/M2s3frO3aN7ukNDq7CKIwfVz71/VfPaLQMY7/ jirzp9yIBZEi4E+PwP38FAGiD+nxzuUJv1rvxf6koqUGoHRvdppju2JLrC2nKW0La7RX7uZJ esCVkamT/XaXPROBTrZZqwbIXh2uSMzgXkC2mE1dsBf2rdsJ4y73+0DYq7YE52OV9MNoCYLH vpkapmD00svsP4sskRsrquPHkBBVCJa22lTaS8Oow9hGQe7BDjEhsVoPol889F0mbTRb3klv mGQ6/B/HA0pGWR9wISY8a7D40/qz6eE6+Yg22mtN1T8FFlNbyVmtBj0R/2HfJYhGBElLPefH jhF0TA==
Message-ID: <82bf1799-1045-5e68-52e3-7d284e33c414@riseup.net>
Date: Tue, 19 Jun 2018 12:31:00 +0000
MIME-Version: 1.0
Content-Type: multipart/signed; micalg="pgp-sha512"; protocol="application/pgp-signature"; boundary="7ASXGYSeVxdefgIbeFP9K13k30k7PUzJC"
Archived-At: <https://mailarchive.ietf.org/arch/msg/doh/2F9gzPFkKlnt86TefauP-TWeAvw>
Subject: [Doh] Is privacy a DoH protocol goal? (was: some privacy ponderings wrt HTTPs and plain DNS)
X-BeenThere: doh@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: DNS Over HTTPS <doh.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/doh>, <mailto:doh-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/doh/>
List-Post: <mailto:doh@ietf.org>
List-Help: <mailto:doh-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/doh>, <mailto:doh-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Jun 2018 12:31:22 -0000

(split from the original thread to clarify some general questions before
talking about how specific issues could be addressed)

> If you think User-Agent can be a problem, then you shouldn't use TLS
>  either.

Privacy is about risk reduction there is no 100% safe solution.

User-Agent strings are likely to be logged since many/most webserver configurations log it by default.
Many operators might store that data even if they have no use for it or not even an intention to store it.

I see a value in minimizing fingerprintability (and data collection) even if it doesn't make it impossible. 

It boils down to the following question:

Is privacy a DoH protocol goal?

If privacy is a DoH protocol goal:
- Privacy against whom? 
 - Your random eavesdropper on the wire? 
 - Your eavesdropper + resolver?
 - if the resolver is in scope: sending a non-hardcoded user-agent is counter the protocol goal.
- What are reasonable privacy expectations a user might have when using DoH?

Note: It is not entirely clear to me if privacy is a DoH protocol goal since the word "privacy"
does not appear in the current draft (11). 
Sara pointed to the relevant part in the charter:
> The working group will analyze the security and privacy issues that
> could arise from accessing DNS over HTTPS.

I guess "analyze" doesn't include to mitigate privacy issues(?), but the 
document aims at giving a overview of what the privacy implications 
of doing DNS over HTTPS are? Is this a correct interpretation?

If DoH's adversary model does not include the resolver:

Lets make it clear that the resolver might be able to learn more and track DoH clients more
than a current non-DoH resolver is able to track non-DoH clients due to all the privacy implications
HTTP has and that people who's threat model includes the resolver might want to use other protocols that
don't use HTTP?


kind regards,
nusenu
-- 
https://twitter.com/nusenu_
https://mastodon.social/@nusenu




> Sorry I remembered the old text. (It was once a "MUST" in the past.)
> 
> But what are you expecting with a DoH protocol running over 
> HTTP/1.0?

Nothing, I was merely pointing out that HTTP/2 is not required
and clients do not require HTTP/2 for DoH as of the current draft (11).


> When you look at the Client Hello packet, you will find different 
> browsers have different things in it. Even different versions of a 
> same browser are not identical. As far as I know, Chinese government
>  use this technique to block certain TLS protocols, including Tor and
>  OpenVPN. This is far far far more "plaintext fingerprintable" than a
>  User-Agent.

I agree that TLS provides identifiers for fingerprintability, I disagree
with "you shouldn't use TLS" because of it or 'we shouldn't care about user-agent
strings since there are fingerprintability issues in TLS'

> Additionally, detecting a server or a client's software version is 
> actually very easy. I knew there is a certain bug that can't handle 
> ECS headers well in a certain version of miekg/dns Go library. I 
> constructed a packet containing this certain header and sent it to 
> CloudFlare. They crashed and returned nothing. Now I knew 
> CloudFlare's DNS implementation was written in Go. And they even were
> even using the old version! (I'm not sure about now.) The client side
> is the same, as far as I know, miekg/dns has some difficulty 
> processing some Rcode values.
> 
> To conclude: Hiding User-Agent does nothing to protect privacy. 

It is a well understood that user agent strings provide identifying bits
for fingerprinting:

https://panopticlick.eff.org/static/browser-uniqueness.pdf
https://panopticlick.eff.org/about
https://panopticlick.eff.org/

Our disagreement probably arises from non-matching threat models.
That is the reason I like to have threat model definitions before
discussing mitigations.